Описание
Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.
Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.
A flaw was found in Apache ActiveMQ Artemis. Affected versions of this package allow access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. This also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This issue could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE.
Отчет
This vulnerability is considered Important rather than Critical because, while it does allow an authenticated attacker to exploit exposed MBeans (such as the Log4J2 MBean) to write arbitrary files, the exploit path requires prior authentication. The attacker must have valid credentials to access the Jolokia endpoint, limiting the attack's scope to already-compromised or insider-threat scenarios. Additionally, successful exploitation requires specific conditions, such as controlling the file's content in a way that leads to code execution, which is not guaranteed.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat AMQ Broker 7 | org.apache.activemq/artemis-cli | Not affected | ||
| Red Hat Build of Keycloak | org.apache.activemq/artemis-cli | Not affected | ||
| Red Hat Fuse 7 | org.apache.activemq/artemis-cli | Will not fix | ||
| Red Hat JBoss Enterprise Application Platform 7 | artemis-cli | Not affected | ||
| Red Hat JBoss Enterprise Application Platform 8 | artemis-cli | Not affected | ||
| Red Hat JBoss Enterprise Application Platform Expansion Pack | artemis-cli | Not affected | ||
| Red Hat Single Sign-On 7 | org.apache.activemq/artemis-cli | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
Apache ActiveMQ Artemis allows access to diagnostic information and controls through MBeans, which are also exposed through the authenticated Jolokia endpoint. Before version 2.29.0, this also included the Log4J2 MBean. This MBean is not meant for exposure to non-administrative users. This could eventually allow an authenticated attacker to write arbitrary files to the filesystem and indirectly achieve RCE. Users are recommended to upgrade to version 2.29.0 or later, which fixes the issue.
Apache ActiveMQ Artemis: Authenticated users could perform RCE via Jolokia MBeans
Уязвимость компонента Jolokia Endpoint программной платформы Apache ActiveMQ Artemis, позволяющая нарушителю записывать произвольные файлы
EPSS
8.8 High
CVSS3